{"id":15728,"date":"2023-04-20T11:50:00","date_gmt":"2023-04-20T11:50:00","guid":{"rendered":"https:\/\/education.telefony-taksi.ru\/?p=15728"},"modified":"2023-04-24T17:33:59","modified_gmt":"2023-04-24T17:33:59","slug":"a-human-firewall-as-the-first-line-of-defense","status":"publish","type":"post","link":"https:\/\/education.telefony-taksi.ru\/a-human-firewall-as-the-first-line-of-defense.html","title":{"rendered":"A human firewall as the first line of defense"},"content":{"rendered":"

\"A<\/p>\n

Data breaches now cost an average of $3.92 million, according to a recent study by IBM and Ponemon. In view of the high risk, companies should strengthen their technical measures, but above all also involve their employees. <\/p>\n

The smart devices of modern offices and the Internet of Things (IoT) offer hackers a wider range of attack vectors to infiltrate networks. For organizations looking to optimize their protection against cybercrime, the best approach appears to be a combination of measures that address both technology and people. A seamless defense against attacks cannot be created until it involves technologies such as artificial intelligence (AI) and machine learning (ML) as well as human firewalls.<\/p>\n

The numbers problem<\/h2>\n

Attacks on devices used for both business and personal purposes are particularly effective.<\/p>\n

The number of devices connected to the Internet (smartphones, laptops, tablets, speakers, TVs, etc.) is increasing day by day. According to Gartner, there will be more than 20 billion such devices worldwide by the end of this year. Personal devices such as laptops, tablets and smartphones are often used in both personal and work contexts due to portability and connectivity. Smartphones, in particular, are often used for both purposes, for example, checking business email on personal smartphones, using messaging apps on the business phone, or doing any activity on a phone that was intended to serve both purposes in the first place. This mixing complicates security and increases the risk of human error.<\/p>\n

Train spawn is the leading cause of more than 90 percent of security breaches Phishing attacks are particularly effective in a multi-purpose device environment, as one employee can compromise the entire office network by attacking his or her personal device. The attacks are very popular with cybercriminals because they target people’s emotions, which lead to hasty reactions. For example, if someone receives a tax refund message with a high degree of urgency and he\/she is not adequately educated about cyberattacks, or not educated at all, the risk of confidential data falling into the wrong hands is high.<\/p>\n

Recent regulations such as the European General Data Protection Regulation highlight the importance of vigilance and data protection. Although regular media coverage aims to make people aware of such scams, they regularly fall victim to these attacks. It is clear that more needs to be done. Yet, despite evidence that it is the creation of a human firewall of educated employees* that can make the difference between a secure workforce and a vulnerable one, training is not a top priority for many organizations.<\/p>\n

Build the defense<\/h2>\n

Employee training should be a key part of cybersecurity training protocol and should include the entire workforce, from entry level to management. At this point, however, we should warn against superficial and one-off measures. A company-wide seminar or webinar that anyone can listen to can supposedly save time and effort, but its impact fizzles out very quickly. It’s much more effective to teach cybersecurity with hands-on lessons and humor, as the content is often very technical and difficult to internalize.<\/p>\n

For better security, a communication channel should be established between the IT department and the users.<\/p>\n

A common method is for the company’s IT department to send a simulated phishing email to all employees. This email should be structured in the typical manner for these scams. Using the simulated email, IT can track who opens the email and how widely it is distributed in business processes.<\/p>\n

You should then send an email to the entire organization, stating that the email is a test. At the same time, give an overview of the results in percentages, for example, that 5 percent of management entered their personal data. Those that fail the test should receive more detailed feedback from the IT department. To ensure that employees are aware of all potential warning signs, these tests should be performed at regular intervals. In this way, you establish a communication channel between users and IT so that employees can quickly and proactively respond to fraud attempts and notify IT immediately.<\/p>\n

Comprehensive technology<\/h2>\n

The human firewall is a very effective defense, but even the most sophisticated and highly trained organization could not protect an entire network without the help of technology. That is why human efforts and technology should be combined. Finally, the advancement of technology is not only the biggest trigger for security issues, it also equally provides the necessary solutions. Recognize in this context<\/p>\n

Technological advances cause most new cyber threats – and also provide most solutions. But not for all.<\/p>\n

Using simulated phishing emails, IT departments can track employee* responses to the fraudulent email. However, if machine learning and AI algorithms are also used, the patterns of associated network traffic can be analyzed, content from multiple emails can be examined, and this data can be compared to a continuously maintained repository of malicious content in near real-time. This speeds up the detection of a threat and the initiation of protective measures many times over. This is not the kind of speed that people can do on their own.<\/p>\n

Conclusion<\/h2>\n

No organization is safe from cyberattacks. Cybercriminals are not choosy and will try to exploit any security vulnerability. Organizations cannot be complacent and should prioritize both technical tools and human firewalls in their budgets and training protocols. Technology is quickly adapted and updated. Companies that are able to track these developments and fully train their employees have the greatest chance of defending themselves against cyberattacks and preventing bad press, loss of trust and large fines.<\/p>\n","protected":false},"excerpt":{"rendered":"

Data breaches now cost an average of $3.92 million, according to a recent study by IBM and Ponemon. In view […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[132],"tags":[],"yoast_head":"\nA human firewall as the first line of defense - education.telefony-taksi.ru<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/education.telefony-taksi.ru\/a-human-firewall-as-the-first-line-of-defense.html\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A human firewall as the first line of defense - education.telefony-taksi.ru\" \/>\n<meta property=\"og:description\" content=\"Data breaches now cost an average of $3.92 million, according to a recent study by IBM and Ponemon. In view […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/education.telefony-taksi.ru\/a-human-firewall-as-the-first-line-of-defense.html\" \/>\n<meta property=\"og:site_name\" content=\"education.telefony-taksi.ru\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-20T11:50:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-24T17:33:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/education.telefony-taksi.ru\/wp-content\/uploads\/sites\/664\/2023\/04\/eine-menschliche-firewall-3d1dbe3.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/education.telefony-taksi.ru\/a-human-firewall-as-the-first-line-of-defense.html\",\"url\":\"https:\/\/education.telefony-taksi.ru\/a-human-firewall-as-the-first-line-of-defense.html\",\"name\":\"A human firewall as the first line of defense - education.telefony-taksi.ru\",\"isPartOf\":{\"@id\":\"https:\/\/education.telefony-taksi.ru\/#website\"},\"datePublished\":\"2023-04-20T11:50:00+00:00\",\"dateModified\":\"2023-04-24T17:33:59+00:00\",\"author\":{\"@id\":\"https:\/\/education.telefony-taksi.ru\/#\/schema\/person\/9757832f535e6ac17ef2b434ada4c4d5\"},\"breadcrumb\":{\"@id\":\"https:\/\/education.telefony-taksi.ru\/a-human-firewall-as-the-first-line-of-defense.html#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/education.telefony-taksi.ru\/a-human-firewall-as-the-first-line-of-defense.html\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/education.telefony-taksi.ru\/a-human-firewall-as-the-first-line-of-defense.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/education.telefony-taksi.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A human firewall as the first line of defense\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/education.telefony-taksi.ru\/#website\",\"url\":\"https:\/\/education.telefony-taksi.ru\/\",\"name\":\"education.telefony-taksi.ru\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/education.telefony-taksi.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/education.telefony-taksi.ru\/#\/schema\/person\/9757832f535e6ac17ef2b434ada4c4d5\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/education.telefony-taksi.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/education.telefony-taksi.ru\/wp-content\/wphb-cache\/gravatar\/48d\/48d232dc18ef12b4140b5549df65adddx96.jpg\",\"contentUrl\":\"https:\/\/education.telefony-taksi.ru\/wp-content\/wphb-cache\/gravatar\/48d\/48d232dc18ef12b4140b5549df65adddx96.jpg\",\"caption\":\"admin\"},\"url\":\"https:\/\/education.telefony-taksi.ru\/author\/admin\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A human firewall as the first line of defense - education.telefony-taksi.ru","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/education.telefony-taksi.ru\/a-human-firewall-as-the-first-line-of-defense.html","og_locale":"en_US","og_type":"article","og_title":"A human firewall as the first line of defense - education.telefony-taksi.ru","og_description":"Data breaches now cost an average of $3.92 million, according to a recent study by IBM and Ponemon. In view […]","og_url":"https:\/\/education.telefony-taksi.ru\/a-human-firewall-as-the-first-line-of-defense.html","og_site_name":"education.telefony-taksi.ru","article_published_time":"2023-04-20T11:50:00+00:00","article_modified_time":"2023-04-24T17:33:59+00:00","og_image":[{"url":"https:\/\/education.telefony-taksi.ru\/wp-content\/uploads\/sites\/664\/2023\/04\/eine-menschliche-firewall-3d1dbe3.jpg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/education.telefony-taksi.ru\/a-human-firewall-as-the-first-line-of-defense.html","url":"https:\/\/education.telefony-taksi.ru\/a-human-firewall-as-the-first-line-of-defense.html","name":"A human firewall as the first line of defense - education.telefony-taksi.ru","isPartOf":{"@id":"https:\/\/education.telefony-taksi.ru\/#website"},"datePublished":"2023-04-20T11:50:00+00:00","dateModified":"2023-04-24T17:33:59+00:00","author":{"@id":"https:\/\/education.telefony-taksi.ru\/#\/schema\/person\/9757832f535e6ac17ef2b434ada4c4d5"},"breadcrumb":{"@id":"https:\/\/education.telefony-taksi.ru\/a-human-firewall-as-the-first-line-of-defense.html#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/education.telefony-taksi.ru\/a-human-firewall-as-the-first-line-of-defense.html"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/education.telefony-taksi.ru\/a-human-firewall-as-the-first-line-of-defense.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/education.telefony-taksi.ru\/"},{"@type":"ListItem","position":2,"name":"A human firewall as the first line of defense"}]},{"@type":"WebSite","@id":"https:\/\/education.telefony-taksi.ru\/#website","url":"https:\/\/education.telefony-taksi.ru\/","name":"education.telefony-taksi.ru","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/education.telefony-taksi.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/education.telefony-taksi.ru\/#\/schema\/person\/9757832f535e6ac17ef2b434ada4c4d5","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/education.telefony-taksi.ru\/#\/schema\/person\/image\/","url":"https:\/\/education.telefony-taksi.ru\/wp-content\/wphb-cache\/gravatar\/48d\/48d232dc18ef12b4140b5549df65adddx96.jpg","contentUrl":"https:\/\/education.telefony-taksi.ru\/wp-content\/wphb-cache\/gravatar\/48d\/48d232dc18ef12b4140b5549df65adddx96.jpg","caption":"admin"},"url":"https:\/\/education.telefony-taksi.ru\/author\/admin"}]}},"_links":{"self":[{"href":"https:\/\/education.telefony-taksi.ru\/wp-json\/wp\/v2\/posts\/15728"}],"collection":[{"href":"https:\/\/education.telefony-taksi.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/education.telefony-taksi.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/education.telefony-taksi.ru\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/education.telefony-taksi.ru\/wp-json\/wp\/v2\/comments?post=15728"}],"version-history":[{"count":0,"href":"https:\/\/education.telefony-taksi.ru\/wp-json\/wp\/v2\/posts\/15728\/revisions"}],"wp:attachment":[{"href":"https:\/\/education.telefony-taksi.ru\/wp-json\/wp\/v2\/media?parent=15728"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/education.telefony-taksi.ru\/wp-json\/wp\/v2\/categories?post=15728"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/education.telefony-taksi.ru\/wp-json\/wp\/v2\/tags?post=15728"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}